2011 4th IFIP International Conference on New Technologies, Mobility and Security 2011
DOI: 10.1109/ntms.2011.5720614
|View full text |Cite
|
Sign up to set email alerts
|

How Resistant are Sboxes to Power Analysis Attacks?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…As case study to evaluate the security level obtained by each proposed implementation, we will design, characterize and attack the PRIDE Sbox-4, which is the most vulnerable component in block ciphers. Most of the DPA attacks on block ciphers target this non-linear operation block (Sboxes), thus it is widely used as a vehicle to evaluate the security level reached by different countermeasure proposals against DPA attacks [5,11,16,23,24,29,31]. Since our purpose is to compare different technologies, we are going to analyze them from an attacker friendly scenario that allows us to set the same attack conditions.…”
Section: Case Study and Resultsmentioning
confidence: 99%
“…As case study to evaluate the security level obtained by each proposed implementation, we will design, characterize and attack the PRIDE Sbox-4, which is the most vulnerable component in block ciphers. Most of the DPA attacks on block ciphers target this non-linear operation block (Sboxes), thus it is widely used as a vehicle to evaluate the security level reached by different countermeasure proposals against DPA attacks [5,11,16,23,24,29,31]. Since our purpose is to compare different technologies, we are going to analyze them from an attacker friendly scenario that allows us to set the same attack conditions.…”
Section: Case Study and Resultsmentioning
confidence: 99%
“…This makes the SCA using the known Substitute-Box more challenging. These anti-SCA techniques [30] The distribution of the S_Box's HD histogram is shown in Fig. 12.…”
Section: Instance 3 Additional Bonus: Repeat S_box With X_boxmentioning
confidence: 99%
“…Simple Power Analysis (SPA) is most common and useful only when the algorithm is known. The Differential Power Analysis (DPA) (Boey et al, 2011;Carlier et al, 2004;Waddle and Wagner, 2004) is the most powerful method based on statistical analysis and characteristics of the captured power traces. It is effective even when the algorithm is unknown.…”
Section: Power Analysis Attackmentioning
confidence: 99%